Extreme Networks ExtremeWare Command Especificaciones Pagina 113

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 254
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 112
ExtremeWare XOS 10.1 Concepts Guide 113
9 Security
This chapter describes the following topics:
Security Overview on page 113
Network Access Security on page 113
IP Access Lists (ACLs) on page 113
Switch Protection on page 119
Policies on page 120
Management Access Security on page 128
Authenticating Users Using RADIUS or TACACS+ on page 129
Security Overview
Extreme Networks products incorporate a number of features designed to enhance the security of your
network. No one feature can insure security, but by using a number of features in concert, you can
substantially improve the security of your network. The features described in this chapter are part of an
overall approach to network security
Network Access Security
Network access security features control devices accessing your network. In this category are the
following features:
IP Access Lists (ACLs)
IP Access Lists (ACLs)
IP access lists consist of IP access rules and are used to perform packet filtering and forwarding
decisions on incoming traffic. Each packet arriving on an ingress port is compared to the access list
applied to that port and is either permitted or denied. Permitted and denied (dropped) packets can also
be counted. Using access lists has no impact on switch performance.
Vista de pagina 112
1 2 ... 108 109 110 111 112 113 114 115 116 117 118 ... 253 254

Comentarios a estos manuales

Sin comentarios